Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT networks
biblio
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
IoT networks
telnet honeypot detection
SSH Honeypots
security
Scalability
resource-constrained interconnected smart devices
Resiliency
pubcrawl
probability
probabilistic estimation
potential dynamic threats
network intrusion
attacks
intrusion-related threats
intrusion mission
intrusion
Internet of things environment
Internet of Things
Human Factors
honey pots
cyber security crimes
computer network security
Computer crime
attacks mitigation
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
biblio
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Internet of Thing devices
telecommunication network routing
system convergence performance
routing misbehavior mitigation
Router Systems Security
Resiliency
resilience
reputation calculation mechanism
pubcrawl
one-point failure risk
Metrics
malicious misbehaving routers
IoT networks
Internet of Things
Attack detection
inherent decentralized consensus mechanism
Distributed databases
distributed consensus mechanism
distributed blockchain-based RM system
decentralized database
data forwarding services
cryptocurrencies
computer network security
computer network reliability
computer network management
centralized router RM systems
blockchain-based reputation management system
blockchain technique
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
A Novel Intrusion Detection Method for Internet of Things
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
intrusion attacks
security of data
optimal network structure
Neurons
network intrusion detection
Metrics
IoT technology
IoT system
IoT networks
Intrusion Detection Systems
intrusion detection model
intrusion detection method
Intrusion Detection
belief networks
Internet of Things era
Internet of Things
genetic algorithms
Embedded System
deep learning
Deep Belief Network
DBN
Biological cells
Artificial Neural Networks
Resiliency
composability
pubcrawl
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Logic gates
Web browser
smart lock
smart devices
Servers
Security by Default
Scalability
Resiliency
resilience
pubcrawl
policy language
network security
minimal access permissions
Access Control
IoT networks
IoT device communications
IoT application protocols
Internet of Things
internet
default-off networking
Computer crime
Cloud Computing
bluetooth low energy
Bluetooth
Bark phrases access control policies
authorisation
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
biblio
Collaborative Adversarial Modeling for Spectrum Aware IoT Communications
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Pareto-optimal adversarial strategy design
cooperative communication
cooperative spectrum sensing
DSA paradigm
dynamic spectrum access
dynamic spectrum access based networks
environmental sensing capability
inherent DSA vulnerabilities
large scale future 5G Internet of Things
leader-follower game
Pareto optimisation
collaborative SSDF attack
radio spectrum management
selfish adversarial model
selfish adversary
signal detection
spectrum availability estimation
spectrum aware 5G vision
spectrum aware IoT applications
spectrum aware IoT communications
spectrum sensing data falsification attacks
Adversary Models
collaboration
Internet of Things
security
Computational modeling
Games
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hardware
5G mobile communication
IoT networks
sensors
telecommunication security
cognitive radio
wireless channels
adversarial system utility components
collaborative adversarial modeling
collaborative attacks
collaborative group
collaborative selfish adversaries
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
« first
‹ previous
1
2
3
next ›
last »